Product showcase: Sniper – automatically detect and exploit critical CVEs in minutes
High-risk, widespread vulnerabilities cause significant disruptions to already struggling security teams. In 2021, 1100+ CVEs with 9-10 CVSSv3 scores flooded the tech …
Why the C-suite should focus on understanding cybersecurity and investing appropriately
Trend Micro has published a research revealing that persistently low IT/C-suite engagement may imperil investments and expose organizations to increased cyber risk. Over 90% …
Zero trust adoption will continue to mature
Illumio released findings of a study conducted by Forrester Consulting that explore how organizations are approaching their zero trust strategies in 2022 to better navigate …
Ransomware attacks, and ransom payments, are rampant among critical infrastructure organizations
80% of critical infrastructure organizations experienced a ransomware attack in the last year, with an equal number reporting that their security budgets have risen since …
Cloud migrations are taking longer, and require bigger budgets than expected
84% of IT decision-makers across the US and UK say their organization is currently using more than one cloud platform, as businesses’ demands for more choice, flexibility, and …
Data center interconnect market to reach $17 billion by 2026
The data center interconnect market is projected to grow from $8.6 billion in 2021 and is projected to reach $17 billion by 2026; it is expected to grow at a CAGR of 14.5 % …
End of 2021 witnessed an explosion of RDP brute-force attacks
RDP brute-force attacks continue to be one of the most used attack vectors for breaching enterprise networks, ESET’s latest Threat Report has revealed. RDP brute-force …
How cybercriminals are using malware to target Linux-based operating systems
As the most common cloud operating system, Linux is a core part of digital infrastructure and is quickly becoming an attacker’s ticket into a multi-cloud environment. Current …
Why security strategies need a new perspective
After a stream of ransomware campaigns, data leaks, and attacks on critical infrastructure, businesses understand their digitization strategy needs to be complemented by a …
Product showcase: Oxeye.io – Cloud native application security testing
Delivering secure applications requires tooling built for automation in the modern tech stack. Oxeye provides a cloud-native application security testing solution that is …
2021 was the most prolific year on record for data breaches
Spirion released a guide which provides a detailed look at sensitive data breaches in 2021 derived from analysis conducted against the Identity Theft Resource Center (ITRC) …
78% of organizations expect to produce or consume SBOMs in 2022
The Linux Foundation announced the availability of the first in a series of research projects to understand the challenges and opportunities for securing software supply …
Featured news
Sponsored
Don't miss
- The effect of compliance requirements on vulnerability management strategies
- Modernizing incident response in the AI era
- Why cybersecurity leaders trust the MITRE ATT&CK Evaluations
- How the role of observability is changing within organizations
- Cybercriminals used a gaming engine to create undetectable malware loader